Produkti

Echoworx’ complete encryption strategy for privacy encompasses much more
than just data loss prevention. It protects all forms of disparate email data,
whether on mobile devices, desktops, in the cloud or on exchange servers. Internet
users spend much of their day on email, and email lives everywhere: On mobile
devices; on the desktop; in the cloud; and on exchange servers. Echoworx helps
organizations protect all this disparate data. Echoworx is unique because it
provides organizations with the ability to cover all aspects of email.

Encrypted Mail: Encrypted Mail gives organizations the ability
to enforce email encryption at the desktop, completely eliminating the possibility
of confidential information being read by anyone other than the intended recipient.

Encrypted Mail Gateway: Encrypted Mail Gateway is a policy-based
managed encryption solution that provides organizations with an easy way to
enforce email encryption without changing the way employees send and receive
emails.

Encrypted Message Exchange: Encrypted Message Exchange is
a secure web-based portal that enables disparate organizations to work together
and share confidential information within a secure environment.

Mobile Encrypted: MobilEncrypt ENDPOINT is an on-the-device
email encryption solution that enables mobile users to send and receive encrypted
messages directly on their smartphone or tablet.

NNT is a leading provider of PCI DSS and General Security & Compliance solutions. As both a Software Manufacturer and Security Services Provider, we are firmly focused on helping organizations protect their sensitive data in an efficient and cost effective manner.

NNT Change Tracker - File Integrity Monitoring, Device Hardening, Change & Configuration Management and Policy Management for all devices (servers, workstations, network devices and firewalls), across multiple platforms (Unix, Linux, Windows). NNT Change Tracker helps you establish a secure, healthy and compliant state for all devices and will quickly notify you of unplanned changes identifying who made the change, what changed and whether or not it has altered your secure and compliant state.

NNT Log Tracker Containing out-of-the-box correlation and pattern matching technology, NNT Log Tracker provides a comprehensive and secure solution to any compliance mandate and a vital weapon in the fight against cyber-attacks. NNT Log Track self learns the normal and healthy activity within your IT infrastructure enabling better and quicker identification of unusual and potentially harmful activity on a continuous basis. Integration with NNT Change enhances this log management solution providing further context to each event as it relates to your secure and compliant state.

Palo Alto Networks has built a next-generation firewall with several innovative technologies—enabling organizations to fix the firewall. These technologies bring business-relevant elements (applications, users, and content) under policy control on a high performance firewall architecture. This technology runs on a high-performance, purpose-built platform based on Palo Alto Networks' Single-Pass Parallel Processing (SP3) Architecture. Unique to the SP3 Architecture, traffic is only examined once, using hardware with dedicated processing resources for security, networking, content scanning and management to provide line-rate, low-latency performance under load.

Solutions:

For the Enterprise Perimeter
Palo Alto Networks next-generation firewalls enable you to rapidly adopt and safely use applications of all types, Enterprise 2.0 or otherwise, while protecting your organizations’ network resources. Port-based firewalls cannot see or identify these applications and UTMs, simply collapse functions into a single box without addressing the application control challenges.

For the Data Center
Palo Alto Networks next-generation firewalls enable you to, for the first time, deploy flexible and adaptable network security into your data centers. With highly available, high-performance platforms and implementations, Palo Alto Networks next-generation firewalls enable you to maintain availability and response time of your data center applications, while ensuring compliance, increasing visibility, and protecting themselves from an increasingly sophisticated threat landscape.

For the Distributed Enterprise
Palo Alto Networks next-generation firewalls enable you to deploy application, user, and content-based visibility and control not only to your headquarters users, but also to your enterprise branch offices and remote users. Palo Alto next-generation firewalls are available in platforms specifically engineered for deployment at enterprise branch offices, and GlobalProtect establishes a "logical perimeter," ensuring consistent policy and network security for users wherever they may be located.

Protection From Known and Unknown Threats
Palo Alto Networks next-generation firewalls enable you to, for the first time, take a strategic, systematic approach to protecting your organization from an increasingly sophisticated attacker. Today's threats are multi-faceted, targeted, often unique to a particular organization, and use applications, encryption, and tunnels effectively. Palo Alto Networks next-generation firewalls first limit the attack surface by only allowing desirable applications, for the appropriate users and groups.

For Government Agencies
Palo Alto Networks provides government agencies with the network security they need in order to both safely adopt new applications and technologies, and repel a new breed of sophisticated cyber-attacks. Our unique technology provides fine-grained control over applications, users and content and provides fully integrated threat prevention of both known and unknown threats.

IronKey is freeing enterprises from the high cost, risk and complexity of managing the extended enterprise. With IronKey Trusted Access, any user — contractor, remote worker, customer, or supply chain partner — can securely access enterprise provisioned public and private clouds, from anywhere. This enables IT leaders to transform IT into a dynamic service provider — unlocking budgets and resources spent on endpoints, management and infrastructure that otherwise weigh down budgets and hold back innovation. Ranked as the 14th best venture-funded company in The Wall Street Journal's "Next Big Thing," IronKey cloud-based services power Trusted Access and partner solutions, including Imation secure storage devices. IronKey cloud services are used daily by over 3,000 enterprises to manage online access and data for over one million users. More than 70 financial institutions secure their brands and billions in customer online payments with IronKey.

MicroWorld Technologies is an advanced security solution provider specializing in AntiVirus, AntiSpam, Content Security and Network Intrusion Prevention solutions. Incorporated in New Jersey, USA, MicroWorld has offices in India, Germany, Malaysia and South Africa, as well as a powerful network of partners and resellers around the globe.

The key products from MicroWorld are eScan, MailScan and X-Spam. eScan is the advanced AntiVirus, AntiSpam and Content Security solution that safeguards Workstations and Servers from all kinds of Malware, future threats, Adware, Spyware, Spam, Phishing mails and other Content Security Issues.

MailScan is the AntiVirus and AntiSpam solution that safeguards Mail Servers of Enterprises. X-Spam is a dedicated AntiSpam and AntiPhishing solution that works at the MailServer.

MailScan is the world's most advanced Real-Time Anti-Virus and Anti-Spam solution for Mail Servers. MailScan safeguards organizations against Virus, Worm, Trojan and many other malware breeds with futuristic and proactive technologies. Employing an array of intelligent filters, MailScan offers complete protection against Viruses, Spam and Phishing mails, whilst providing comprehensive Content Security too. MailScan is available in more than 32 flavors to protect the different Mail Servers available in the market.